Sim Swapping

De Cryptomcmillan1| Actualizat la May 24, 2020
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification. Once the hacker gotten hold of the victim's mobile phone number, they could proceed to convince the telco company to migrate the victim's phone number to the hacker's number. Otherwise, they could also intercept any authentication and verification number via text messages or mobile phone and bypass the security of personal accounts such as bank accounts and social media accounts.

Împărtășiți cu un prieten!

Termeni asociați

Soft cap
Targeted fund raising limit of an ICO
Block Reward
One of the mechanisms built into a blockchain to incentivize validators
Cloud Mining
Mining on blockchains through rented processing power rented from companies that host the physical equipment.
Whale
Someone who holds an enormous amount of cryptocurrency and has the ability to wave the market
Doriți să aflați mai multe?
Înapoi la Glosar sau Abonați-vă la newsletterul nostru.
coingecko (thumbnail mini)
CoinGecko pentru iOS
coingecko (thumbnail mini)
CoinGecko pentru Android